System and method for distributed, policy-based confidentiality management

a confidentiality management and policy-based technology, applied in the field of computerized information governance, can solve the problems of high administrative burden on businesses and professional service organizations, inability to meet the requirements of the law, so as to achieve the effect of not creating productivity barriers

Inactive Publication Date: 2017-04-13
LIPMAN KEITH
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0016]A system and method for distributed policy-based confidentiality management provides comprehensive management of information security and ethical walls. It streamlines processes for securing confidential information without creating productivity barriers, provides interfaces to support processes of each major audience in a professional service enterprise across multiple systems and allows creation of enterprise policy types for different scenarios and systems affected by the policies. It supports standard policy types and those for lateral hires, ITAR, data privacy, price sensitivity, trade secrets, and conflicts of interest and provides two-stage review to prevent incorrect policy application. A distributed access control system provides user interfaces for granting, denying, and requesting access in a distributed fashion. Reports sort information governance policies by user / group, client / engagement, or policy type. The system prevents both service desk and other professionals from violating risk management policies at all while providing a common user experience.

Problems solved by technology

Hardly a day passes that one does not hear of some new security breach in which hundreds of thousands of credit card numbers or Social Security numbers have been misappropriated.
Compliance with these standards and initiatives imposes a formidable administrative burden on businesses and professional service organizations, and the consequences of failure to comply are often dire.
For example, HIPAA violations can incur significant civil and even criminal sanctions.
In fact, firms may even be subject to surprise audits from clients to verify compliance with agreed-on measures and practices.
Law firms also face the challenge of implementing and maintaining ethical walls, for example, in the case of a lateral hire which has triggered conflict-of-interest rules.
However, so much data is now stored electronically that ethical walls must now extend to most or all of a firm's systems.
Often, however, need-to-know policies are implemented in an ad hoc fashion and, thus, are of limited effectiveness.
Additionally, switching from an open-access model, in which all employees in an organization are given unlimited access to all of a firm's data, to a need-to-know model can be extremely disruptive to a firm's day-to-day activities, frustrating the professional staff and greatly limiting their effectiveness as a result of IT bottlenecks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for distributed, policy-based confidentiality management
  • System and method for distributed, policy-based confidentiality management
  • System and method for distributed, policy-based confidentiality management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]A system and method for distributed policy-based confidentiality management provides comprehensive management of information security and ethical walls. It streamlines processes for securing confidential information without creating productivity barriers, provides interfaces to support processes of each major audience in a professional service enterprise across multiple systems and allows creation of enterprise policy types for different scenarios and systems affected by the policies. It supports standard policy types and those for lateral hires, ITAR, data privacy, price sensitivity, trade secrets, and conflicts of interest and provides two-stage review to prevent incorrect policy application. A distributed access control system provides user interfaces for granting, denying, and requesting access in a distributed fashion. Reports sort information governance policies by user / group, client / engagement, or policy type. The system prevents both service desk and other professional...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for distributed policy-based confidentiality management provides comprehensive management of information security and ethical walls. It streamlines processes for securing confidential information without creating productivity barriers, provides interfaces to support processes of each major audience in a professional service enterprise across multiple systems and allows creation of enterprise policy types for different scenarios and systems affected by the policies. It supports standard policy types and those for lateral hires, ITAR, data privacy, price sensitivity, trade secrets, and conflicts of interest and provides two-stage review to prevent incorrect policy application. A distributed access control system provides user interfaces for granting, denying, and requesting access in a distributed fashion. Reports sort information governance policies by user/group, client/engagement, or policy type. The system prevents both service desk and other professionals from violating risk management policies at all while providing a common user experience.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation-in-part of U.S. patent application Ser. No. 14 / 335,857, filed Jul. 18, 2014, which is incorporated herein in its entirety by this reference thereto. U.S. patent application Ser. No. 14 / 335,857 claims benefit of U.S. provisional patent application Ser. No. 61 / 856,691, filed on Jul. 20, 2013, which applications are incorporated herein in their entireties by this reference thereto.BACKGROUND[0002]Technical Field[0003]The invention generally relates to the field of computerized information governance. More particularly, the invention relates to a system and method for distributed policy-based confidentiality management.[0004]Background Information[0005]An aspect of business process management that is steadily growing in importance, particularly in professional service organizations such as law firms, is information governance. Data privacy and data security are in the news constantly. Hardly a day passes tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/62H04L29/06
CPCH04L63/10G06F21/6245G06F21/6218H04L63/20
Inventor LIPMAN, KEITH
Owner LIPMAN KEITH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products